Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 342 (0.292 secs)
You searched for: (collection:hackercons OR mediatype:hackercons) AND -mediatype:collection
[1] 2 3 4 5 6 7     Next    Last
[movies]Bsides Cleveland 2012 BsidesCLE
Videos from Bsides Cleveland 2012 All videos and download links are at: http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/mainlist
Keywords: security; hacking
Downloads: 1,020 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]OHM2013: Julian Assange - Wikileaks Fights On
How is Wikileaks dealing with the assault against it and what new leaks it is making available to the world. Wikileaks founder Jullian Assange will be speaking over video link from the Equadorian Embassy in London.Presenter: Julian Assangehttps://program.ohm2013.org/event/324.html Day 1 Start time 22:00 Duration 1:00 Location T1: Orwell Hall Type Lecture Track Observe
Keywords: OHM2013; wikileaks; julian assange
Downloads: 53 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]OHM2013: Zoltan Balazs - The quest for the client-side elixir against zombie browsers
Hacking client side protection systems (sandboxes, internet security suites, financial endpoint protection systems) with malicious browser extensions. In 2012 I have created and published proof-of-concept malicious browser extensions for Firefox, Chrome and Safari. With these, one can steal cookies, passwords, spy on webcam, use the browser as a proxy, change financial transactions in the background, steal files, and many more malicious things...
Keywords: OHM2013; talk; sandbox; security; browser extention; firefox; chrome; safari; Zoltan Balazs
Downloads: 17 (1 review)
[movies]Open Source Intelligence: Data Patterns on the WWW - Valdis Krebs
Valdis will present his work in "open source intelligence" -- finding interesting data and patterns on the WWW and making sense of them. He will explain how he used the web to create various network analyses with purely public information. * 9/11 hijackers, their supporters, and their connections * book buying patterns on Amazon * economic development community in NE Ohio * the blogosphere in NE Ohio Valdis will explain a simple method to follow in tracking web data and how Google is the only re...
Downloads: 43 2.00 out of 5 stars2.00 out of 5 stars(1 review)
[movies]Jason Scott's Presentation Presentation - Jason Scott
During the preview evening of Notacon 6 in Cleveland, Ohio, Jason Scott, a frequent presenter at Notacon and other events, offered to give a presentation on the art of presenting. Subjects covered include motivation, performance, content, common pitfalls, frequent harbingers of narrative/presentation doom, and memories of presentations gone right and wrong. The speech was recorded with a static hi-def recorder, so Jason does walk offscreen or get cut off at various junctions, but his voice remai...
Keywords: presentation; jason scott; notacon
Downloads: 1,941 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Super Jason Scott Presentation 64 - Tedd St. Rain
Presented at Notacon 6 in Cleveland, OH on April 17, 2009. Jason Scott walks through the context and playing of Super Mario 64, the Mario Brothers launch title accompanying the Nintendo 64. Talks about the growing field of "Platform Studies", the lessons learned from the unique situation of Super Mario 64, and describes ways that modern programmers and coders can learn from the approach taken to the relatively new general experience of the 3D Platformer in 1996...
Keywords: nintendo; mario; jason scott; notacon; blockparty; cleveland
Downloads: 2,639 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Clobbering the Cloud - Harron Meer

Downloads: 2
[movies]LAN for Life Charity Events - Kel Cecil
I would like to share the methodology that we have used when planning and executing our "LAN for Life" events. This method has been the result of over two years of careful study of our events as well as other LAN party events. I'll begin by discussing the initial steps of planning the event, such as setting a proper date and finding a suitable location for an event. Next, I'll discuss the process of acquiring local and national corporate sponsors...
Downloads: 3
[movies]Announcement of CTF Winners and Final HITB Charity Auction - HITB Organizers

Downloads: 2
[movies]How to Own the World One Desktop at a Time - Saumin Shah

Downloads: 3
[movies]Outbound Content Compliance - Jim Noble
Outbound Content Compliance is a growing industry within Information Security. This area of control watches traffic and data in networks to scan the content for potential violations of policy. With the increase in visibility of personal data loss, organizations are increasingly coming under fire to tighten their controls, and ensure data privacy to the consumer. Today, several 1st generation products provide the visibility to the "data leakage", providing the ability to modify existing controls ...
Downloads: 4
[movies]Passive Asset Detection System - Matt Shelton

Downloads: 6
[movies]Keynote - Ryan Russell

Downloads: 8
[movies]Using Honeyclients to Discover New Attacks - Kathy Wang

Downloads: 2
[movies]Origins of a Hackercon
Re-LoaD talks about how the Brumcon 2600 event was started. Recorded at LUG Radio Live 2009 in Wolverhampton, England.
Keywords: LUG; Radio; LUGradio; live; re-load; brumcon; origins; hackercon
Downloads: 22
[movies]Saturday Keynote - Jennifer Granick
Jennifer Stisa Granick joined Stanford Law School in January 2001, as Lecturer in Law and Executive Director of the Center for Internet and Society (CIS). She teaches, speaks and writes on the full spectrum of Internet law issues including computer crime and security, national security, constitutional rights, and electronic surveillance, areas in which her expertise is recognized nationally. Granick came to Stanford after almost a decade practicing criminaldefense law in California...
Downloads: 6
[movies]2007 BlackHat Vegas-V33-Baker-Kick Ass Hypervisoring.mp4
2007 BlackHat Vegas-V33-Baker-Kick Ass Hypervisoring.mp4
Downloads: 1
[movies]How Low Will Malware Go - Nishad Herath

Downloads: 6
[movies]Cross Site Scripting MySpace dot Com - Rick Deacon
How to exploit Cross Site Scripting holes in MySpace.com, for session hijacking or other means. Multiple exploits will be discussed. Depending on the information present at the time, some may be 0-day. The methodology and practices involved will always be relevant to MySpace as well as many other sites containing Cross Site Scripting holes. MySpace is still filled with hundreds of unattended and undiscovered Cross Site Scripting exploits...
Downloads: 11
[movies]2007 BlackHat Vegas-V27-Feinstein-Peck-CaffeineMonkey.mp4
2007 BlackHat Vegas-V27-Feinstein-Peck-CaffeineMonkey.mp4
[movies]2007 BlackHat Vegas-V45-Stender-Blind Security Testing.mp4
2007 BlackHat Vegas-V45-Stender-Blind Security Testing.mp4
Downloads: 1
[movies]OHM2013: Quux - ColoClue lightening talk
Introduction to ColoClue and why you want to become a member.http://coloclue.net/https://program.ohm2013.org/event/386.html
Keywords: OHM2013; talk; lightning talk; ColoClue; quux
Downloads: 9
[movies]Hacking from the Restroom - Bruno Goncalves

Downloads: 6
[movies]Snort Overview - Cazz

Downloads: 11
[movies]2007 BlackHat Vegas-V56-Schmiedl-Spindel-Stregths-Weakness ACS.mp4
2007 BlackHat Vegas-V56-Schmiedl-Spindel-Stregths-Weakness ACS.mp4
[movies]2007 BlackHat Vegas-V6-Schneider-Reflective DNS Poison.mp4
2007 BlackHat Vegas-V6-Schneider-Reflective DNS Poison.mp4
[movies]2007 BlackHat Vegas-V23-Grossman-Hansen-Hacking Intranet.mp4
2007 BlackHat Vegas-V23-Grossman-Hansen-Hacking Intranet.mp4
[movies]2007 BlackHat Vegas-V57-DeHaas-Side Channel Attacks-DPA.mp4
2007 BlackHat Vegas-V57-DeHaas-Side Channel Attacks-DPA.mp4
[movies]2007 BlackHat Vegas-V14-Panel-Meet The VCs.mp4
2007 BlackHat Vegas-V14-Panel-Meet The VCs.mp4
[movies]2007 BlackHat Vegas-V65-Perry-Securing the Tor Net.mp4
2007 BlackHat Vegas-V65-Perry-Securing the Tor Net.mp4
[movies]2007 BlackHat Vegas-V66-Dingledine-Mathewson-Tor and Blocking.mp4
2007 BlackHat Vegas-V66-Dingledine-Mathewson-Tor and Blocking.mp4
[movies]2007 BlackHat Vegas-V51-Christy-Panel-Meet the Fed.mp4
2007 BlackHat Vegas-V51-Christy-Panel-Meet the Fed.mp4
[movies]2007 BlackHat Vegas-V53-Heasman-Hacking extensible Firmware.mp4
2007 BlackHat Vegas-V53-Heasman-Hacking extensible Firmware.mp4
[movies]2007 BlackHat Vegas-V22-Byrne-Anti-DNS Pinning.mp4
2007 BlackHat Vegas-V22-Byrne-Anti-DNS Pinning.mp4
[movies]2007 BlackHat Vegas-V28-Snyder-Shaver-Building and Breaking Browser.mp4
2007 BlackHat Vegas-V28-Snyder-Shaver-Building and Breaking Browser.mp4
[movies]2007 BlackHat Vegas-V49-Harbour-Stealth Secrets Malware Ninjas.mp4
2007 BlackHat Vegas-V49-Harbour-Stealth Secrets Malware Ninjas.mp4
[movies]2007 BlackHat Vegas-V60-Geers-Greetz from room 101.mp4
2007 BlackHat Vegas-V60-Geers-Greetz from room 101.mp4
[movies]2007 BlackHat Vegas-V61-Coffey-Viega-Building and Effective AppSec.mp4
2007 BlackHat Vegas-V61-Coffey-Viega-Building and Effective AppSec.mp4
[movies]2007 BlackHat Vegas-V54-Barisani-Bianco-Injecting-RDS-TMC.mp4
2007 BlackHat Vegas-V54-Barisani-Bianco-Injecting-RDS-TMC.mp4
[movies]2007 BlackHat Vegas-V58-Clark-Year in Review.mp4
2007 BlackHat Vegas-V58-Clark-Year in Review.mp4
[movies]2007 BlackHat Vegas-V19-Eriksson-Oberg-Nyberg Janmar-Kernel Wars.mp4
2007 BlackHat Vegas-V19-Eriksson-Oberg-Nyberg Janmar-Kernel Wars.mp4
[movies]APRSHAM Radio - MARES
[movies]The Chaos Communications Congress Blinkenlights Press Video Collection
A collection of videos related to the Blinkenlights projects of the Chaos Communications Congress, mostly press and news programs.
Downloads: 3
[movies]Countering Attacks at Layer 2 - Eric Smith
Network security at layer two is often overlooked because many administrators do not consider attacks from within to be a credible threat. This philosophy may apply to carefully firewalled data centers, but universities and other institutional settings are particularly vulnerable to attacks at layer two. Furthermore, nearly all wireless networks, even those employing WPA or 802.1x, can fall victim to the inherent trust designs of the underlying ethernet protocols...
Downloads: 36
[movies]Network Policy Enforcement / Network Quarantine - Latest Security Gimmick or Good Idea? - Steve Manzuik
Steve Manzuik has more than 13 thirteen years of experience in the information technology and security industry, with a particular emphasis on operating systems and network devices. In 2001, Mr. Manzuik founded and was the technical lead for Entrench Technologies. Prior to Entrench, Mr. Manzuik was a manager in Ernst & Young's Security & Technology Solutions practice, where he was the solution line leader for the Canadian Penetration Testing Practice...
Downloads: 11
[audio]Codecon 2004 Audio Collection

Downloads: 2
[audio]The reality of the user - Hadi, Niels ten Oever, FiekeJ
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare
Downloads: 10
[audio]Codecon 2002 Audio Collection

Downloads: 1
[software]Hacker Conference Photos (1990s)

Downloads: 1
[movies]PDF Origami Strikes Back - Frederic Raynal - Guillaume Deluge - Damien Aumaitre

Downloads: 3
[1] 2 3 4 5 6 7     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
audio
software